Ontology type: schema:Chapter Open Access: True
2002
AUTHORSArno Hollosi , Reinhard Posch , Herbert Leitold
ABSTRACTWhen encouraging citizens to approach public administrations by electronic means in order to improve the public services and to avoid costly media transitions from paper-based applies to IT-supported back-office applications, authorities and implementers need to be in particular cautious in two aspects: On the one hand, security is an indispensable guiding principle for concerns of legal certainty, identification and authentication requirements, confidentiality and data protection aspects, and certainly security is needed to achieve broad user acceptance. Electronic signatures based on smartcards represent a state-of-the-art in supporting several of these security requirements. On the other hand, the concepts followed need to be technology-neutral to a large extent to both remain open for future or emerging technologies that may mature to meet these security requirements as well and to avoid discrimination against particular solutions. Otherwise inclusion of upcoming solutions may well turn out a costly experience. In this paper the approaches followed with the Austrian citizen card are discussed — an ambitious project that aims at deploying e-Government on the large scale. By means of an open interface the authorities specify the requirements arising out of the applications in the administrative bodies. This allows the authorities to launch the development of applications based on well-defined interfaces, but not mandating a certain technological instantiation such as a social security card, public identity cards, or private-sector-borne signature cards such as banking cards. By taking up and implementing the interface specification an open market is stimulated that paves the way to a public-private partnerships. The paper gives the rationale of choosing the open interface approach and discusses its actual implementation — the so-called security layer — in detail. More... »
PAGES255-266
Advanced Communications and Multimedia Security
ISBN
978-1-4757-4405-7
978-0-387-35612-9
http://scigraph.springernature.com/pub.10.1007/978-0-387-35612-9_19
DOIhttp://dx.doi.org/10.1007/978-0-387-35612-9_19
DIMENSIONShttps://app.dimensions.ai/details/publication/pub.1025826774
JSON-LD is the canonical representation for SciGraph data.
TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT
[
{
"@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json",
"about": [
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Information and Computing Sciences",
"type": "DefinedTerm"
},
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Data Format",
"type": "DefinedTerm"
},
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0806",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Information Systems",
"type": "DefinedTerm"
}
],
"author": [
{
"affiliation": {
"alternateName": "Chief Information Office (CIO), Austria",
"id": "http://www.grid.ac/institutes/None",
"name": [
"Chief Information Office (CIO), Austria"
],
"type": "Organization"
},
"familyName": "Hollosi",
"givenName": "Arno",
"id": "sg:person.013157272711.58",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013157272711.58"
],
"type": "Person"
},
{
"affiliation": {
"alternateName": "Chief Information Office (CIO), Austria",
"id": "http://www.grid.ac/institutes/None",
"name": [
"Chief Information Office (CIO), Austria"
],
"type": "Organization"
},
"familyName": "Posch",
"givenName": "Reinhard",
"id": "sg:person.011236005071.18",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011236005071.18"
],
"type": "Person"
},
{
"affiliation": {
"alternateName": "Institute for Applied Information Processing and Communications (IAIK), Graz University of Technology, Austria",
"id": "http://www.grid.ac/institutes/grid.410413.3",
"name": [
"Institute for Applied Information Processing and Communications (IAIK), Graz University of Technology, Austria"
],
"type": "Organization"
},
"familyName": "Leitold",
"givenName": "Herbert",
"id": "sg:person.012516432633.90",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012516432633.90"
],
"type": "Person"
}
],
"datePublished": "2002",
"datePublishedReg": "2002-01-01",
"description": "When encouraging citizens to approach public administrations by electronic means in order to improve the public services and to avoid costly media transitions from paper-based applies to IT-supported back-office applications, authorities and implementers need to be in particular cautious in two aspects: On the one hand, security is an indispensable guiding principle for concerns of legal certainty, identification and authentication requirements, confidentiality and data protection aspects, and certainly security is needed to achieve broad user acceptance. Electronic signatures based on smartcards represent a state-of-the-art in supporting several of these security requirements. On the other hand, the concepts followed need to be technology-neutral to a large extent to both remain open for future or emerging technologies that may mature to meet these security requirements as well and to avoid discrimination against particular solutions. Otherwise inclusion of upcoming solutions may well turn out a costly experience. In this paper the approaches followed with the Austrian citizen card are discussed \u2014 an ambitious project that aims at deploying e-Government on the large scale. By means of an open interface the authorities specify the requirements arising out of the applications in the administrative bodies. This allows the authorities to launch the development of applications based on well-defined interfaces, but not mandating a certain technological instantiation such as a social security card, public identity cards, or private-sector-borne signature cards such as banking cards. By taking up and implementing the interface specification an open market is stimulated that paves the way to a public-private partnerships. The paper gives the rationale of choosing the open interface approach and discusses its actual implementation \u2014 the so-called security layer \u2014 in detail.",
"editor": [
{
"familyName": "Jerman-Bla\u017ei\u010d",
"givenName": "Borka",
"type": "Person"
},
{
"familyName": "Klobu\u010dar",
"givenName": "Toma\u017e",
"type": "Person"
}
],
"genre": "chapter",
"id": "sg:pub.10.1007/978-0-387-35612-9_19",
"inLanguage": "en",
"isAccessibleForFree": true,
"isPartOf": {
"isbn": [
"978-1-4757-4405-7",
"978-0-387-35612-9"
],
"name": "Advanced Communications and Multimedia Security",
"type": "Book"
},
"keywords": [
"security requirements",
"open interfaces",
"Austrian citizen card",
"data protection aspects",
"back-office applications",
"development of applications",
"authentication requirements",
"security layer",
"citizen card",
"user acceptance",
"security card",
"social security cards",
"signature cards",
"banking cards",
"electronic signatures",
"identity card",
"upcoming solutions",
"actual implementation",
"interface approach",
"electronic means",
"cards",
"security",
"requirements",
"protection aspects",
"interface",
"smartcards",
"large scale",
"applications",
"confidentiality",
"instantiation",
"ambitious project",
"media transition",
"costly experience",
"implementation",
"services",
"public administration",
"public services",
"technology",
"solution",
"open market",
"implementers",
"art",
"project",
"aspects",
"concept",
"hand",
"way",
"large extent",
"means",
"order",
"particular solutions",
"acceptance",
"detail",
"authorities",
"signatures",
"principles",
"citizens",
"administrative bodies",
"experience",
"market",
"future",
"identification",
"concern",
"development",
"state",
"Guiding Principles",
"public-private partnerships",
"government",
"legal certainty",
"layer",
"certainty",
"rationale",
"scale",
"partnership",
"discrimination",
"body",
"inclusion",
"extent",
"transition",
"paper",
"approach",
"administration"
],
"name": "An Open Interface Enabling Secure E-Government",
"pagination": "255-266",
"productId": [
{
"name": "dimensions_id",
"type": "PropertyValue",
"value": [
"pub.1025826774"
]
},
{
"name": "doi",
"type": "PropertyValue",
"value": [
"10.1007/978-0-387-35612-9_19"
]
}
],
"publisher": {
"name": "Springer Nature",
"type": "Organisation"
},
"sameAs": [
"https://doi.org/10.1007/978-0-387-35612-9_19",
"https://app.dimensions.ai/details/publication/pub.1025826774"
],
"sdDataset": "chapters",
"sdDatePublished": "2022-05-20T07:47",
"sdLicense": "https://scigraph.springernature.com/explorer/license/",
"sdPublisher": {
"name": "Springer Nature - SN SciGraph project",
"type": "Organization"
},
"sdSource": "s3://com-springernature-scigraph/baseset/20220519/entities/gbq_results/chapter/chapter_405.jsonl",
"type": "Chapter",
"url": "https://doi.org/10.1007/978-0-387-35612-9_19"
}
]
Download the RDF metadata as: json-ld nt turtle xml License info
JSON-LD is a popular format for linked data which is fully compatible with JSON.
curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-0-387-35612-9_19'
N-Triples is a line-based linked data format ideal for batch operations.
curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-0-387-35612-9_19'
Turtle is a human-readable linked data format.
curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-0-387-35612-9_19'
RDF/XML is a standard XML format for linked data.
curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-0-387-35612-9_19'
This table displays all metadata directly associated to this object as RDF triples.
168 TRIPLES
23 PREDICATES
109 URIs
101 LITERALS
7 BLANK NODES
Subject | Predicate | Object | |
---|---|---|---|
1 | sg:pub.10.1007/978-0-387-35612-9_19 | schema:about | anzsrc-for:08 |
2 | ″ | ″ | anzsrc-for:0804 |
3 | ″ | ″ | anzsrc-for:0806 |
4 | ″ | schema:author | Nd9b983350c814d1db645481d7005fc72 |
5 | ″ | schema:datePublished | 2002 |
6 | ″ | schema:datePublishedReg | 2002-01-01 |
7 | ″ | schema:description | When encouraging citizens to approach public administrations by electronic means in order to improve the public services and to avoid costly media transitions from paper-based applies to IT-supported back-office applications, authorities and implementers need to be in particular cautious in two aspects: On the one hand, security is an indispensable guiding principle for concerns of legal certainty, identification and authentication requirements, confidentiality and data protection aspects, and certainly security is needed to achieve broad user acceptance. Electronic signatures based on smartcards represent a state-of-the-art in supporting several of these security requirements. On the other hand, the concepts followed need to be technology-neutral to a large extent to both remain open for future or emerging technologies that may mature to meet these security requirements as well and to avoid discrimination against particular solutions. Otherwise inclusion of upcoming solutions may well turn out a costly experience. In this paper the approaches followed with the Austrian citizen card are discussed — an ambitious project that aims at deploying e-Government on the large scale. By means of an open interface the authorities specify the requirements arising out of the applications in the administrative bodies. This allows the authorities to launch the development of applications based on well-defined interfaces, but not mandating a certain technological instantiation such as a social security card, public identity cards, or private-sector-borne signature cards such as banking cards. By taking up and implementing the interface specification an open market is stimulated that paves the way to a public-private partnerships. The paper gives the rationale of choosing the open interface approach and discusses its actual implementation — the so-called security layer — in detail. |
8 | ″ | schema:editor | N0e7eb0868bec4e0c9e97e296982ec4f4 |
9 | ″ | schema:genre | chapter |
10 | ″ | schema:inLanguage | en |
11 | ″ | schema:isAccessibleForFree | true |
12 | ″ | schema:isPartOf | N8b6cf0014d764c81af8adda0bceb8558 |
13 | ″ | schema:keywords | Austrian citizen card |
14 | ″ | ″ | Guiding Principles |
15 | ″ | ″ | acceptance |
16 | ″ | ″ | actual implementation |
17 | ″ | ″ | administration |
18 | ″ | ″ | administrative bodies |
19 | ″ | ″ | ambitious project |
20 | ″ | ″ | applications |
21 | ″ | ″ | approach |
22 | ″ | ″ | art |
23 | ″ | ″ | aspects |
24 | ″ | ″ | authentication requirements |
25 | ″ | ″ | authorities |
26 | ″ | ″ | back-office applications |
27 | ″ | ″ | banking cards |
28 | ″ | ″ | body |
29 | ″ | ″ | cards |
30 | ″ | ″ | certainty |
31 | ″ | ″ | citizen card |
32 | ″ | ″ | citizens |
33 | ″ | ″ | concept |
34 | ″ | ″ | concern |
35 | ″ | ″ | confidentiality |
36 | ″ | ″ | costly experience |
37 | ″ | ″ | data protection aspects |
38 | ″ | ″ | detail |
39 | ″ | ″ | development |
40 | ″ | ″ | development of applications |
41 | ″ | ″ | discrimination |
42 | ″ | ″ | electronic means |
43 | ″ | ″ | electronic signatures |
44 | ″ | ″ | experience |
45 | ″ | ″ | extent |
46 | ″ | ″ | future |
47 | ″ | ″ | government |
48 | ″ | ″ | hand |
49 | ″ | ″ | identification |
50 | ″ | ″ | identity card |
51 | ″ | ″ | implementation |
52 | ″ | ″ | implementers |
53 | ″ | ″ | inclusion |
54 | ″ | ″ | instantiation |
55 | ″ | ″ | interface |
56 | ″ | ″ | interface approach |
57 | ″ | ″ | large extent |
58 | ″ | ″ | large scale |
59 | ″ | ″ | layer |
60 | ″ | ″ | legal certainty |
61 | ″ | ″ | market |
62 | ″ | ″ | means |
63 | ″ | ″ | media transition |
64 | ″ | ″ | open interfaces |
65 | ″ | ″ | open market |
66 | ″ | ″ | order |
67 | ″ | ″ | paper |
68 | ″ | ″ | particular solutions |
69 | ″ | ″ | partnership |
70 | ″ | ″ | principles |
71 | ″ | ″ | project |
72 | ″ | ″ | protection aspects |
73 | ″ | ″ | public administration |
74 | ″ | ″ | public services |
75 | ″ | ″ | public-private partnerships |
76 | ″ | ″ | rationale |
77 | ″ | ″ | requirements |
78 | ″ | ″ | scale |
79 | ″ | ″ | security |
80 | ″ | ″ | security card |
81 | ″ | ″ | security layer |
82 | ″ | ″ | security requirements |
83 | ″ | ″ | services |
84 | ″ | ″ | signature cards |
85 | ″ | ″ | signatures |
86 | ″ | ″ | smartcards |
87 | ″ | ″ | social security cards |
88 | ″ | ″ | solution |
89 | ″ | ″ | state |
90 | ″ | ″ | technology |
91 | ″ | ″ | transition |
92 | ″ | ″ | upcoming solutions |
93 | ″ | ″ | user acceptance |
94 | ″ | ″ | way |
95 | ″ | schema:name | An Open Interface Enabling Secure E-Government |
96 | ″ | schema:pagination | 255-266 |
97 | ″ | schema:productId | N2b5d405ea96a4ea49ad09bf942922b33 |
98 | ″ | ″ | N74d51951ac374c5c99324d6d9ec95360 |
99 | ″ | schema:publisher | Nbfb9cafb832f47e9b163a099319c4aba |
100 | ″ | schema:sameAs | https://app.dimensions.ai/details/publication/pub.1025826774 |
101 | ″ | ″ | https://doi.org/10.1007/978-0-387-35612-9_19 |
102 | ″ | schema:sdDatePublished | 2022-05-20T07:47 |
103 | ″ | schema:sdLicense | https://scigraph.springernature.com/explorer/license/ |
104 | ″ | schema:sdPublisher | N8d042d96a1844135bd9166c97045c558 |
105 | ″ | schema:url | https://doi.org/10.1007/978-0-387-35612-9_19 |
106 | ″ | sgo:license | sg:explorer/license/ |
107 | ″ | sgo:sdDataset | chapters |
108 | ″ | rdf:type | schema:Chapter |
109 | N0e7eb0868bec4e0c9e97e296982ec4f4 | rdf:first | N6fdaf1e29eb741819a58de09197ec78e |
110 | ″ | rdf:rest | N79a6ad60682e47cd8f62cea639c6bad3 |
111 | N2b5d405ea96a4ea49ad09bf942922b33 | schema:name | dimensions_id |
112 | ″ | schema:value | pub.1025826774 |
113 | ″ | rdf:type | schema:PropertyValue |
114 | N693a64af0e3e476fa8ce7b9ad4ecc559 | rdf:first | sg:person.012516432633.90 |
115 | ″ | rdf:rest | rdf:nil |
116 | N6fdaf1e29eb741819a58de09197ec78e | schema:familyName | Jerman-Blažič |
117 | ″ | schema:givenName | Borka |
118 | ″ | rdf:type | schema:Person |
119 | N74d51951ac374c5c99324d6d9ec95360 | schema:name | doi |
120 | ″ | schema:value | 10.1007/978-0-387-35612-9_19 |
121 | ″ | rdf:type | schema:PropertyValue |
122 | N79a6ad60682e47cd8f62cea639c6bad3 | rdf:first | N8dbdd0dcb7e141df92a31e70085161d5 |
123 | ″ | rdf:rest | rdf:nil |
124 | N8b6cf0014d764c81af8adda0bceb8558 | schema:isbn | 978-0-387-35612-9 |
125 | ″ | ″ | 978-1-4757-4405-7 |
126 | ″ | schema:name | Advanced Communications and Multimedia Security |
127 | ″ | rdf:type | schema:Book |
128 | N8d042d96a1844135bd9166c97045c558 | schema:name | Springer Nature - SN SciGraph project |
129 | ″ | rdf:type | schema:Organization |
130 | N8dbdd0dcb7e141df92a31e70085161d5 | schema:familyName | Klobučar |
131 | ″ | schema:givenName | Tomaž |
132 | ″ | rdf:type | schema:Person |
133 | Nbfb9cafb832f47e9b163a099319c4aba | schema:name | Springer Nature |
134 | ″ | rdf:type | schema:Organisation |
135 | Nd0d6dd07a8674b80852f49be4b2d059c | rdf:first | sg:person.011236005071.18 |
136 | ″ | rdf:rest | N693a64af0e3e476fa8ce7b9ad4ecc559 |
137 | Nd9b983350c814d1db645481d7005fc72 | rdf:first | sg:person.013157272711.58 |
138 | ″ | rdf:rest | Nd0d6dd07a8674b80852f49be4b2d059c |
139 | anzsrc-for:08 | schema:inDefinedTermSet | anzsrc-for: |
140 | ″ | schema:name | Information and Computing Sciences |
141 | ″ | rdf:type | schema:DefinedTerm |
142 | anzsrc-for:0804 | schema:inDefinedTermSet | anzsrc-for: |
143 | ″ | schema:name | Data Format |
144 | ″ | rdf:type | schema:DefinedTerm |
145 | anzsrc-for:0806 | schema:inDefinedTermSet | anzsrc-for: |
146 | ″ | schema:name | Information Systems |
147 | ″ | rdf:type | schema:DefinedTerm |
148 | sg:person.011236005071.18 | schema:affiliation | grid-institutes:None |
149 | ″ | schema:familyName | Posch |
150 | ″ | schema:givenName | Reinhard |
151 | ″ | schema:sameAs | https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011236005071.18 |
152 | ″ | rdf:type | schema:Person |
153 | sg:person.012516432633.90 | schema:affiliation | grid-institutes:grid.410413.3 |
154 | ″ | schema:familyName | Leitold |
155 | ″ | schema:givenName | Herbert |
156 | ″ | schema:sameAs | https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012516432633.90 |
157 | ″ | rdf:type | schema:Person |
158 | sg:person.013157272711.58 | schema:affiliation | grid-institutes:None |
159 | ″ | schema:familyName | Hollosi |
160 | ″ | schema:givenName | Arno |
161 | ″ | schema:sameAs | https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013157272711.58 |
162 | ″ | rdf:type | schema:Person |
163 | grid-institutes:None | schema:alternateName | Chief Information Office (CIO), Austria |
164 | ″ | schema:name | Chief Information Office (CIO), Austria |
165 | ″ | rdf:type | schema:Organization |
166 | grid-institutes:grid.410413.3 | schema:alternateName | Institute for Applied Information Processing and Communications (IAIK), Graz University of Technology, Austria |
167 | ″ | schema:name | Institute for Applied Information Processing and Communications (IAIK), Graz University of Technology, Austria |
168 | ″ | rdf:type | schema:Organization |